Follow
Razvi Doomun
Razvi Doomun
Verified email at uom.ac.mu
Title
Cited by
Cited by
Year
Business process modelling, simulation and reengineering: call centres
R Doomun, N Vunka Jungum
Business Process Management Journal 14 (6), 838-848, 2008
1302008
An energy‐efficient and security aware route selection protocol for wireless sensor networks
T Hayajneh, R Doomun, G Al‐Mashaqbeh, BJ Mohd
Security and Communication Networks 7 (11), 2015-2038, 2014
482014
Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security.
MR Doomun, KMS Soyjaudah
Int. J. Netw. Secur. 9 (1), 82-94, 2009
432009
Multi‐level information system security in outsourcing domain
M Razvi Doomun
Business Process Management Journal 14 (6), 849-857, 2008
412008
Integrated green cloud computing architecture
MN Hulkury, MR Doomun
2012 International Conference on Advanced Computer Science Applications and …, 2012
392012
Low-cost bluetooth mobile positioning for location-based application
MZ Barahim, MR Doomun, N Joomun
2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-4, 2007
352007
Secloud: Source and destination seclusion using clouds for wireless ad hoc networks
R Doomun, T Hayajneh, P Krishnamurthy, D Tipper
2009 IEEE Symposium on Computers and Communications, 361-367, 2009
282009
Energy consumption and computational analysis of Rijndael-AES
MR Doomun, KMS Soyjaudah, D Bundhoo
2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-6, 2007
252007
Novel algorithms and techniques in telecommunications and networking
TM Sobh, K Elleithy, A Mahmood
Springer, 2010
242010
Innovative algorithms and techniques in automation, industrial electronics and telecommunications
T Sobh, K Elleithy, A Mahmood, M Karim
Springer Science & Business Media, 2007
232007
Source—destination obfuscation in wireless ad hocnetworks
T Hayajneh, R Doomun, P Krishnamurthy, D Tipper
Security and Communication Networks 4 (8), 888-901, 2011
182011
HCRBAC –An Access Control System for Collaborative Context-Aware HealthCare Services in Mauritius
O Moonian, S Cheerkoot-Jalim, SD Nagowah, KK Khedo, R Doomun, ...
Journal of Health Informatics in Developing Countries 2 (2), 2008
182008
AES-CBC software execution optimization
R Doomun, J Doma, S Tengur
2008 International Symposium on Information Technology 1, 1-8, 2008
162008
Resource saving AES-CCMP design with hybrid counter mode block chaining-MAC
MR Doomun, KMS Soyjaudah
IJCSNS International Journal of Computer Science and Network Security 8 (10 …, 2008
142008
Collaborative driving support system in mobile pervasive environments
NV Jungum, RM Doomun, SD Ghurbhurrun, S Pudaruth
2008 The Fourth International Conference on Wireless and Mobile …, 2008
82008
Route extrapolation for source and destination camouflage in wireless ad hoc networks
MR Doomun, KMS Soyjaudah
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
62010
AES CCMP Algorithm with N-Way Interleaved Chiper Block Chaining
Z Codabux-Rossan, MR Doomun
University of Mauritius Research Journal 15 (1), 527-544, 2009
62009
Adaptive IEEE 802.11 i security for energy-security optimization
MR Doomun, KMS Soyjaudah
The Third Advanced International Conference on Telecommunications (AICT'07 …, 2007
62007
Performance of interleaved cipher block chaining in CCMP
Z Codabux-Rossan, MR Doomun
Novel Algorithms and Techniques in Telecommunications and Networking, 53-58, 2010
52010
Business Process Modelling, Simulation and Reengineering: Call Centress
D Razvi, VJ Nevin
Business Process Management Journal 6, 838-848, 2008
42008
The system can't perform the operation now. Try again later.
Articles 1–20